This project documents my work and findings from the ANZ Australia Cyber Security Management Virtual Experience Program hosted on Forage.
The simulation involved analyzing network traffic captured in a PCAP file using Wireshark and identifying potential cybersecurity threats. Tasks included extracting and analyzing images, documents, and hidden messages from HTTP traffic.
- Wireshark
- HxD Hex Editor
- Base64 Decoder
- Online ZIP Extractor
- Extracted
anz-logo.jpgandbank-card.jpgfrom PCAP by identifying HTTP GET requests and carving JPEG data based on hex signatures.
- Extracted
ANZ1.jpgandANZ2.jpgwith hidden messages appended post image footer:- ANZ1: “You've found a hidden message in this file!”
- ANZ2: “You've found the hidden message! Images are sometimes more than they appear.”
- Recovered a suspicious document
how-to-commit-crimes.docxcontaining a message implying malicious intent.
- Extracted PDFs:
ANZ_Document.pdf,ANZ_Document2.pdf, andevil.pdf.
- File
hiddenmessage2.txtwas a disguised JPEG image.
atm-image.jpgcontained two concatenated JPEG images in a single GET request.
broken.pngwas base64 encoded. Decoded and reconstructed successfully.
securepdf.pdfwas a disguised ZIP containing an encrypted PDF. Password “secure” was found in TCP stream.
All recovered images and documents are included in this repository under the /artifacts directory.
See ANZ_PCAP_Investigation_Report.pdf for detailed methodology and visual evidence.
👤 Author: Akash Sebastian
📅 Completed: April 2025